SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 239
Secured Online Payment System
1Swapna B Sasi, 2Aaditya Anil, 3Arjun T A, 4Harry John
1AP, CSE Department, Jyothi Engineering College, Kerala, India
2 3 4 Students, CSE Department, Jyothi Engineering College, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Online payment system allows money
transfers to be made only through internet instead
of using cash or a check, in person or by mail.
Nowadays there is a tremendous growth in online
payment throughout the world, so the E-shopping
users are facing more problems. The main problem
is security. We provide secured online payment
system through various techniques. The main
techniques used are Steganography, Visual
Cryptography and OCR. This paper presents a new
approach for providing limited information only
that is necessary for fund transfer during online
shopping.
Key Words: Information security; Steganography;
Visual Cryptography; Online shopping
1. INTRODUCTION
In this busy world most of us prefer doing online shopping
and online payment. Since there is no waste of time in this
process a tremendous growth in online payment has been
seen throughout the world. Online shopping security is a
concern for everyone who makes purchases on the Internet,
but it is also an important issue for business leaders — and
not just those in the retail sector. Firms go for online
shopping, and their employees frequently make business
purchases on the company credit card. So, the attackers
mainly focus on this process and e-shopping usersarefacing
more problem. Security is the main problem behind this
system. Online payment is an electronic payment for goods
or services electronically without using cash or check in
person or by mail. It could be achieved through different
modes. Different modes are Debit card,Creditcard,E-money
and Electronic fund transfer. Since there is less security by
using this type of payment, we provide a secure payment by
using different technologies [4].
This paper consist of a new proposed system, that
uses text based steganography [2] and visual cryptography
[1]. It provides only limited information that isnecessary for
fund transfer during online shoppingandthereby protecting
customer data and increasing customer confidence and
preventing identity theft [4]. Optical character recognition
also known as OCR [7] is used to convert the typed, printed
or handwritten text into encoded machine text. It can be
used in machine translation, text-to-speech and text mining.
The method proposed is specificallyforE-Commercebutcan
easily be extended for online as well as physical banking.
2. STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY
Steganography is a practice of hiding a secret message
within an ordinary message and the extraction of it at its
destination. Steganography takes cryptography a step
farther by hiding an encrypted message such that no one
suspects it exists. Ideally, anyone scanning yourdata will fail
to know it contains encrypted data. The messages could be
hidden under image, audio, video, text.
The text based steganography [2] technique is based on
Vedic Numeric Code. Frequencyoflettersin Englishalphabet
in conjunction with Vedic Numeric Code is used for the
steganography technique. No separate importance is given
for vowels and consonants. Text steganography[2]usestext
as a cover media for hiding message. Message can be hidden
by shifting word and line in the open spaces and in word
sequence. Sentence properties such as number of words,
number of characters and number of vowels and position of
a vowel in a word are also used to hide secret message. The
advantage of choosing text steganography over other
steganographic technique [12] is its smaller memory
requirement and simpler communication.
Visual cryptography (VC)[5][10] was brought out by Moni
Naor and Adi Shamir at EUROCRYPT 1994. It is used to
encrypt written material (printed text, handwritten notes,
pictures, etc) in a perfectly secure way. The decoding part is
done by the human visual system directly, without any
computation cost. Using k out of n (k,n) visual secret sharing
scheme [11], a secret imageisencodedintonshadowimages
called shares [8][9], in which each participant in P receives
one share. The original message is visible if any k or more of
them are stacked together, but totally invisible if fewer than
k transparencies are stacked together.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 240
3. PROPOSED TEXT BASED STEGANOGRAPHY METHOD
In this paper, Steganography uses characteristics of English
language such as inflexion, fixed word order and use of
periphrases for hiding data rather than using propertiesofa
sentence. This gives more flexibility and freedom from the
point view of sentence construction but it increases
computational complexity.
3.1 ENCODING
Encoding involves the use of a code to change original data
into a form that can be used by an external process. Thetype
of code used for converting charactersisknownasAmerican
Standard Code for InformationInterchange(ASCII),the most
commonly used encoding scheme for files that contain text.
ASCII contains printable and nonprintable characters that
represent uppercase and lowercase letters, symbols,
punctuation marks and numbers. A unique number is
assigned to some characters.
 Each letter is represented in secret message by its
equivalent ASCII code.
 ASCII code is converted to equivalent 8 bit binary
number.
 8 bit binary number is divided into two 4 bit parts.
 Suitable letters arechosenfromTable1corresponding
to the 4 bit parts [1].
 Meaningful sentence is constructed by using letters
obtained as the first letters of suitable words.
 Encoding is not case sensitive.
3.2 DECODING
Decoding is the opposite process -- the conversion of an
encoded format back into the original sequence of
characters.
 Representation of corresponding 4 bit number by
taking the first letter in eachwordofcovermessage.
 4 bit binary numbers are combined to obtain 8 bit
number.
 ASCII codes are acquired from 8 bit numbers.
Finally secret message is restored from ASCII codes
Table -1: Number Assignment
Letter Number
Assigned
Letter Number
Assigned
E 15 M 7
A 14 H 7
R 13 G 6
I 13 B 5
O 12 F 4
T 11 Y 4
N 11 W 3
S 10 K 3
L 10 V 3
C 9 X 2
U 8 Z 2
D 8 J 1
P 7 Q 0
4. PROPOSED PAYMENT METHOD
In the proposed payment systemsolution,informationtothe
online merchant submitted by the customer is minimized by
providing only minimum information that verifies only the
payment made by the said customer from its bank account.
This is attained by the introduction of a central Certified
Authority (CA) [3] and combined application of
steganography and visual cryptography [1] [10]. The
information accepted by the merchant can be in the form of
account number related to the card used for shopping.
The information will only validate receipt of payment from
authentic customer. In the proposed method, the user first
need to register by entering his account no and password
including other details. By registering he/she will get the
certificate. It contains the customer unique authentication
password in connection to the bank which is hidden insidea
cover text using the text based steganography method by
using LSB (Least Significant Bit) algorithm [6]. This process
is shown in Figure 1.
The LSB based image steganography embeds the secret
message in the least significant bits of pixel values of the
cover text. In the LSB approach, the basic idea is to replace
the Least Significant Bits (LSB) of the cover text withthebits
of the messages to be hidden without destroying the
property of the cover text significantly. Customer
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 241
authentication information that is the account no in
connection with merchant is placed above the cover text in
its original form. Now a snapshot of two texts is taken as
shown in Figure 2. From now one share is kept by the
customer and the other share is kept in the database of the
certified authority as shown in Figure 3 and Figure 4. Figure
5 shows the result of combining share 1 and share 2.
Fig -1: Architectural Diagram
During online shopping, after selection of desired
item and adding it to the cart, preferred payment system of
the merchant directs the customer to the CertifiedAuthority
portal. In the portal, shopper or the customer submits
his/her own share and the merchant submits its own
account details. Now the CA combines its own share with
shopper’s share and obtains the original image.
From CA now, merchant’s account details, cover text are
sent to the bank where customer authenticationpasswordis
recovered from the cover text. This is done by OCR
technology [7] [15]. OCR (optical character recognition) is
the recognition of printed or written text characters by a
computer. This involves photo scanning of the text
character-by-character, analysis of the scanned-in image,
and then translation of the character image into character
codes, such as ASCII, commonly used in data processing.
Customer authentication informationissenttothemerchant
by CA. After receiving customer authentication password,
bank matches it with its own database and after verifying
legitimate customer, then the bank transfers fund from the
customer account to the submitted merchant account.
Finally when the merchant receives the fund, then
merchant’s payment system authorizes receipt of payment
using customer authentication information.
One problem is that CA does not know to which bank to
forward the cover text obtained from combining twoshares.
It can be solved by appending 9 digit routing or transit
number of bank with customer authentication information.
5. ADVANTAGES
 Provides high security due to the usage of 2
techniques viz, Steganography and Visual
Cryptoraphy [1].
 Proposed method minimizes customer
information sent to the online merchant. So in
case of a breach in merchant’s database,
customer doesn’t get affected. It also prevents
unlawful use of customer information at
merchant’s side.
 Presence of a fourth party [3], CA, enhances
customer’s satisfaction and security further as
more number of parties is involved in the
process.
 Usage of steganography ensures that the CA
does not know customer authentication
password thus maintaining customer privacy.
 Cover text can be sent in the form of email from
CA to bank to avoid rising suspicion. Since
customer data is distributed over 3 parties, a
breach in single database can easily be
contented.
Fig -2: Snapshot account no and cover text.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 242
Fig -3: Share 1 kept by customer.
Fig -4: Share 2 kept by CA.
Fig -5: Overlapping of share 1 and share 2.
6. METHOD EXTENSION
The present system is developed in such a way that it can
undergo future enhancements in an efficient manner. Now
the password is converted using encoding technique
whereas in future, encryption techniques can be
implemented to make the system more secured. A mobile
application can also be build so that users will be more
comfortable in using it. The payment system can also be
extended to physical banking. In addition to customer
authentication password, shares may contain customer
image or signature. In the bank, customer submits its own
share and customer’s physical signature is validated against
the signature obtained by combining customer’s share and
CA’s share along with validation of customer authentication
password. It prevents misuse of stolen card and stops
illegitimate customer.
7. CONCLUSIONS
The traditional approaches in online payment system
somehow do not allow necessary secrecy totheusers.Inthis
paper online payment system is proposed bycombining text
based Steganography and visual cryptography [1]. It
provides customer data privacy and prevents misuseofdata
at merchant’s side. This paper proposes a steganographic
algorithm for hiding text files in images. The visual
cryptography is used for secret sharing of images. The CA
will control the encoding and decoding processes. OCR
technology [13] is used for identifying texts and characters
from images and this OCR technology method is concerned
only with prevention of identity theft and customer data
security. In comparison to the banking application which
uses steganography and visual cryptography they are
basically applied for physical banking. Not only for physical
banking, the proposed method can be applied for e-
commerce which focuses on payment during online
shopping as well as physical banking.
REFERENCES
[1] Souvik Roy, P. Venkateswaran “Online Payment System
Using Steganography and Visual Cryptography,” 2014
IEEE Students’ Conference on Electrical,Electronicsand
Computer Science. M. Young, The Technical Writer’s
Handbook. Mill Valley, CA: University Science, 1989.
[2] Sharma et al., “A New Approach to Hide Text in Images
Using Steganography,” International Journal of
Advanced Research in Computer Science and Software
Engineering 3(4), April - 2013, pp. 701-708.
[3] Wang Yang Yu, Chun Gang Yan “Modeling and
verification of online shopping business processes by
considering malicious behaviour patterns,” IEEE
Transactions,2014.
[4] K.S.Suganya, K.Manikandan“Enhanced Secure E-
Gateway using Hierarchical Visual Cryptography,”IJETT
vol.3 Jan 2015- ISSN: 2349 – 9303.
[5] Shyam Nandan Kumar “Cryptography during Data
Sharing and Accessing Over Cloud,” International
Transaction of Electrical and Computer Engineers
System, 2015, Vol. 3, No. 1, 12-18.
[6] Shilpa Gupta1,Geeta Gujral2,Neha Aggarwal3“Enhanced
Least Significant Bit algorithm For Image
Steganography,” IJCEM International Journal of
Computational Engineering & Management, Vol. 15
Issue 4, July 2012.
[7] Amarjot Singh, Ketan Bacchuwar, Akshay Bhasin “A
Survey of OCR Applications,” International Journal of
Machine Learning and Computing, Vol. 2, No. 3, June
2012.
[8] Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli “Visual
Cryptography for Print and Scan Applications,” Circuits
and Systems, 2004. ISCAS '04. Proceedings of the 2004
International Symposium
[9] Pallavi Vijay Chavan, R.S. Mangrulkar, Third
International Conference on Emerging Trends in
Engineering and technology, “Encrypting Informative
Color Image using Color Visual Cryptography” 2010
IEEEDOI 10.1109/ICETET.2010.94.
[10] Lekhika Chettri, “Visual CryptographySchemeBasedOn
Pixel Expansion for Black & White Image”, International
Journal Of Computer Science and Information
Technologies, Vol.5 (3),2014,4190-4193.
[11] Mr Rohith S, Mr Vinay G “A Novel Two Stage Binary
Image Security using (2,2) Visual Cryptography
Scheme,” International Journal Computational
Engineering Research, ISSN:2250-3005.
[12] Arfan Shaikh1, Kirankumar Solanki2, Vishal Uttekar3,
Neeraj Vishwakarma4” “Audio Steganography And
Security Using Cryptography” International Journal of
Emerging Technology and Advanced Engineering, ISO
9001:2008 Certified Journal, Volume 4, Issue 2,
February 2014.
[13] Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip
Basu, Mita Nasipuri,”Design of an Optical Character
Recognition System for Camera-based Handheld
Devices”, International journal of Computer Science
Issues, Vol. 8, Issue 4, pp. 283-289, July 2011.

More Related Content

What's hot

Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
EuroCloud
 
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATIONSELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
AM Publications
 

What's hot (17)

Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
7317ijcis01
7317ijcis017317ijcis01
7317ijcis01
 
Bengali Numeric Number Recognition
Bengali Numeric Number RecognitionBengali Numeric Number Recognition
Bengali Numeric Number Recognition
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...
 
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireles...
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating System
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATIONSELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
 
Online Hand Written Character Recognition
Online Hand Written Character RecognitionOnline Hand Written Character Recognition
Online Hand Written Character Recognition
 

Similar to Secured Online Payment System

SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Similar to Secured Online Payment System (20)

Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC System
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...
MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...
MULTI-LAYER DIGITAL VALIDATION OF CANDIDATE SERVICE APPOINTMENT WITH DIGITAL ...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

Secured Online Payment System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 239 Secured Online Payment System 1Swapna B Sasi, 2Aaditya Anil, 3Arjun T A, 4Harry John 1AP, CSE Department, Jyothi Engineering College, Kerala, India 2 3 4 Students, CSE Department, Jyothi Engineering College, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Online payment system allows money transfers to be made only through internet instead of using cash or a check, in person or by mail. Nowadays there is a tremendous growth in online payment throughout the world, so the E-shopping users are facing more problems. The main problem is security. We provide secured online payment system through various techniques. The main techniques used are Steganography, Visual Cryptography and OCR. This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping. Key Words: Information security; Steganography; Visual Cryptography; Online shopping 1. INTRODUCTION In this busy world most of us prefer doing online shopping and online payment. Since there is no waste of time in this process a tremendous growth in online payment has been seen throughout the world. Online shopping security is a concern for everyone who makes purchases on the Internet, but it is also an important issue for business leaders — and not just those in the retail sector. Firms go for online shopping, and their employees frequently make business purchases on the company credit card. So, the attackers mainly focus on this process and e-shopping usersarefacing more problem. Security is the main problem behind this system. Online payment is an electronic payment for goods or services electronically without using cash or check in person or by mail. It could be achieved through different modes. Different modes are Debit card,Creditcard,E-money and Electronic fund transfer. Since there is less security by using this type of payment, we provide a secure payment by using different technologies [4]. This paper consist of a new proposed system, that uses text based steganography [2] and visual cryptography [1]. It provides only limited information that isnecessary for fund transfer during online shoppingandthereby protecting customer data and increasing customer confidence and preventing identity theft [4]. Optical character recognition also known as OCR [7] is used to convert the typed, printed or handwritten text into encoded machine text. It can be used in machine translation, text-to-speech and text mining. The method proposed is specificallyforE-Commercebutcan easily be extended for online as well as physical banking. 2. STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY Steganography is a practice of hiding a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step farther by hiding an encrypted message such that no one suspects it exists. Ideally, anyone scanning yourdata will fail to know it contains encrypted data. The messages could be hidden under image, audio, video, text. The text based steganography [2] technique is based on Vedic Numeric Code. Frequencyoflettersin Englishalphabet in conjunction with Vedic Numeric Code is used for the steganography technique. No separate importance is given for vowels and consonants. Text steganography[2]usestext as a cover media for hiding message. Message can be hidden by shifting word and line in the open spaces and in word sequence. Sentence properties such as number of words, number of characters and number of vowels and position of a vowel in a word are also used to hide secret message. The advantage of choosing text steganography over other steganographic technique [12] is its smaller memory requirement and simpler communication. Visual cryptography (VC)[5][10] was brought out by Moni Naor and Adi Shamir at EUROCRYPT 1994. It is used to encrypt written material (printed text, handwritten notes, pictures, etc) in a perfectly secure way. The decoding part is done by the human visual system directly, without any computation cost. Using k out of n (k,n) visual secret sharing scheme [11], a secret imageisencodedintonshadowimages called shares [8][9], in which each participant in P receives one share. The original message is visible if any k or more of them are stacked together, but totally invisible if fewer than k transparencies are stacked together.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 240 3. PROPOSED TEXT BASED STEGANOGRAPHY METHOD In this paper, Steganography uses characteristics of English language such as inflexion, fixed word order and use of periphrases for hiding data rather than using propertiesofa sentence. This gives more flexibility and freedom from the point view of sentence construction but it increases computational complexity. 3.1 ENCODING Encoding involves the use of a code to change original data into a form that can be used by an external process. Thetype of code used for converting charactersisknownasAmerican Standard Code for InformationInterchange(ASCII),the most commonly used encoding scheme for files that contain text. ASCII contains printable and nonprintable characters that represent uppercase and lowercase letters, symbols, punctuation marks and numbers. A unique number is assigned to some characters.  Each letter is represented in secret message by its equivalent ASCII code.  ASCII code is converted to equivalent 8 bit binary number.  8 bit binary number is divided into two 4 bit parts.  Suitable letters arechosenfromTable1corresponding to the 4 bit parts [1].  Meaningful sentence is constructed by using letters obtained as the first letters of suitable words.  Encoding is not case sensitive. 3.2 DECODING Decoding is the opposite process -- the conversion of an encoded format back into the original sequence of characters.  Representation of corresponding 4 bit number by taking the first letter in eachwordofcovermessage.  4 bit binary numbers are combined to obtain 8 bit number.  ASCII codes are acquired from 8 bit numbers. Finally secret message is restored from ASCII codes Table -1: Number Assignment Letter Number Assigned Letter Number Assigned E 15 M 7 A 14 H 7 R 13 G 6 I 13 B 5 O 12 F 4 T 11 Y 4 N 11 W 3 S 10 K 3 L 10 V 3 C 9 X 2 U 8 Z 2 D 8 J 1 P 7 Q 0 4. PROPOSED PAYMENT METHOD In the proposed payment systemsolution,informationtothe online merchant submitted by the customer is minimized by providing only minimum information that verifies only the payment made by the said customer from its bank account. This is attained by the introduction of a central Certified Authority (CA) [3] and combined application of steganography and visual cryptography [1] [10]. The information accepted by the merchant can be in the form of account number related to the card used for shopping. The information will only validate receipt of payment from authentic customer. In the proposed method, the user first need to register by entering his account no and password including other details. By registering he/she will get the certificate. It contains the customer unique authentication password in connection to the bank which is hidden insidea cover text using the text based steganography method by using LSB (Least Significant Bit) algorithm [6]. This process is shown in Figure 1. The LSB based image steganography embeds the secret message in the least significant bits of pixel values of the cover text. In the LSB approach, the basic idea is to replace the Least Significant Bits (LSB) of the cover text withthebits of the messages to be hidden without destroying the property of the cover text significantly. Customer
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 241 authentication information that is the account no in connection with merchant is placed above the cover text in its original form. Now a snapshot of two texts is taken as shown in Figure 2. From now one share is kept by the customer and the other share is kept in the database of the certified authority as shown in Figure 3 and Figure 4. Figure 5 shows the result of combining share 1 and share 2. Fig -1: Architectural Diagram During online shopping, after selection of desired item and adding it to the cart, preferred payment system of the merchant directs the customer to the CertifiedAuthority portal. In the portal, shopper or the customer submits his/her own share and the merchant submits its own account details. Now the CA combines its own share with shopper’s share and obtains the original image. From CA now, merchant’s account details, cover text are sent to the bank where customer authenticationpasswordis recovered from the cover text. This is done by OCR technology [7] [15]. OCR (optical character recognition) is the recognition of printed or written text characters by a computer. This involves photo scanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing. Customer authentication informationissenttothemerchant by CA. After receiving customer authentication password, bank matches it with its own database and after verifying legitimate customer, then the bank transfers fund from the customer account to the submitted merchant account. Finally when the merchant receives the fund, then merchant’s payment system authorizes receipt of payment using customer authentication information. One problem is that CA does not know to which bank to forward the cover text obtained from combining twoshares. It can be solved by appending 9 digit routing or transit number of bank with customer authentication information. 5. ADVANTAGES  Provides high security due to the usage of 2 techniques viz, Steganography and Visual Cryptoraphy [1].  Proposed method minimizes customer information sent to the online merchant. So in case of a breach in merchant’s database, customer doesn’t get affected. It also prevents unlawful use of customer information at merchant’s side.  Presence of a fourth party [3], CA, enhances customer’s satisfaction and security further as more number of parties is involved in the process.  Usage of steganography ensures that the CA does not know customer authentication password thus maintaining customer privacy.  Cover text can be sent in the form of email from CA to bank to avoid rising suspicion. Since customer data is distributed over 3 parties, a breach in single database can easily be contented. Fig -2: Snapshot account no and cover text.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 242 Fig -3: Share 1 kept by customer. Fig -4: Share 2 kept by CA. Fig -5: Overlapping of share 1 and share 2. 6. METHOD EXTENSION The present system is developed in such a way that it can undergo future enhancements in an efficient manner. Now the password is converted using encoding technique whereas in future, encryption techniques can be implemented to make the system more secured. A mobile application can also be build so that users will be more comfortable in using it. The payment system can also be extended to physical banking. In addition to customer authentication password, shares may contain customer image or signature. In the bank, customer submits its own share and customer’s physical signature is validated against the signature obtained by combining customer’s share and CA’s share along with validation of customer authentication password. It prevents misuse of stolen card and stops illegitimate customer. 7. CONCLUSIONS The traditional approaches in online payment system somehow do not allow necessary secrecy totheusers.Inthis paper online payment system is proposed bycombining text based Steganography and visual cryptography [1]. It provides customer data privacy and prevents misuseofdata at merchant’s side. This paper proposes a steganographic algorithm for hiding text files in images. The visual cryptography is used for secret sharing of images. The CA will control the encoding and decoding processes. OCR technology [13] is used for identifying texts and characters from images and this OCR technology method is concerned only with prevention of identity theft and customer data security. In comparison to the banking application which uses steganography and visual cryptography they are basically applied for physical banking. Not only for physical banking, the proposed method can be applied for e- commerce which focuses on payment during online shopping as well as physical banking. REFERENCES [1] Souvik Roy, P. Venkateswaran “Online Payment System Using Steganography and Visual Cryptography,” 2014 IEEE Students’ Conference on Electrical,Electronicsand Computer Science. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Sharma et al., “A New Approach to Hide Text in Images Using Steganography,” International Journal of Advanced Research in Computer Science and Software Engineering 3(4), April - 2013, pp. 701-708. [3] Wang Yang Yu, Chun Gang Yan “Modeling and verification of online shopping business processes by considering malicious behaviour patterns,” IEEE Transactions,2014. [4] K.S.Suganya, K.Manikandan“Enhanced Secure E- Gateway using Hierarchical Visual Cryptography,”IJETT vol.3 Jan 2015- ISSN: 2349 – 9303. [5] Shyam Nandan Kumar “Cryptography during Data Sharing and Accessing Over Cloud,” International Transaction of Electrical and Computer Engineers System, 2015, Vol. 3, No. 1, 12-18. [6] Shilpa Gupta1,Geeta Gujral2,Neha Aggarwal3“Enhanced Least Significant Bit algorithm For Image Steganography,” IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 4, July 2012. [7] Amarjot Singh, Ketan Bacchuwar, Akshay Bhasin “A Survey of OCR Applications,” International Journal of Machine Learning and Computing, Vol. 2, No. 3, June 2012. [8] Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli “Visual Cryptography for Print and Scan Applications,” Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium [9] Pallavi Vijay Chavan, R.S. Mangrulkar, Third International Conference on Emerging Trends in Engineering and technology, “Encrypting Informative Color Image using Color Visual Cryptography” 2010 IEEEDOI 10.1109/ICETET.2010.94. [10] Lekhika Chettri, “Visual CryptographySchemeBasedOn Pixel Expansion for Black & White Image”, International Journal Of Computer Science and Information Technologies, Vol.5 (3),2014,4190-4193. [11] Mr Rohith S, Mr Vinay G “A Novel Two Stage Binary Image Security using (2,2) Visual Cryptography Scheme,” International Journal Computational Engineering Research, ISSN:2250-3005. [12] Arfan Shaikh1, Kirankumar Solanki2, Vishal Uttekar3, Neeraj Vishwakarma4” “Audio Steganography And Security Using Cryptography” International Journal of Emerging Technology and Advanced Engineering, ISO 9001:2008 Certified Journal, Volume 4, Issue 2, February 2014. [13] Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip Basu, Mita Nasipuri,”Design of an Optical Character Recognition System for Camera-based Handheld Devices”, International journal of Computer Science Issues, Vol. 8, Issue 4, pp. 283-289, July 2011.